Sciweavers

2513 search results - page 177 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
SCAM
2008
IEEE
15 years 11 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 11 months ago
A Visualization Framework for Task-Oriented Modeling Using UML
— The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Softwar...
Christian F. J. Lange, Martijn A. M. Wijns, Michel...
VMCAI
2010
Springer
16 years 1 months ago
Model-Checking In-Lined Reference Monitors
Abstract. A technique for elegantly expressing In-lined Reference Monitor (IRM) certification as model-checking is presented and implemented. In-lined Reference Monitors (IRM'...
Meera Sridhar, Kevin W. Hamlen
IRI
2006
IEEE
15 years 10 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
ISSTA
2004
ACM
15 years 10 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner